Fudo Privileged Session Manager

FUDO PSM is a state-of-the-art solution allowing to monitor, control and record all remote access sessions to an IT infrastructure. Using FUDO ensures highest possible security levels of corporate IT systems accessed by external partners on daily basis. FUDO actively monitors network traffic and records all SSH, RDP, HTTP, HTTPS, MySQL, Oracle and VNC remote access sessions. It allows for analyzing archived sessions as well as currently active connections. When supervising an active session, the administrator can terminate, pause or join in to work along with the remote user. All sessions recorded on FUDO are encrypted and timestamped.

Business benefits of implementing FUDO:Companies which decide to implement FUDO, receive an instrument which takes their IT security to a whole different level. FUDO provides a total control of all remote connections to server infrastructure, ensuring a good night sleep for system administrators and much greater monitoring options for IT security personnel.

Thanks to WHEEL FUDO PSM anonymous access becomes fully attributable. We know who has access to privileged accounts in the client’s infrastructure. We know by whom and at what time those accounts were accessed, as well aswhich users are more active and which accounts are most frequently used. Live supervision and the ability to playback recorded sessions enables better control and event analysis.

Supported protocols

command line protocols: SSH, Telnet, Telnet 3270

graphical protocols: RDP, VNC, X11

database protocols; Oracle, MySQL, TDS implementation for MS SQL

other protocols: HTTP, HTTPS, Modbus

Live sessions

ongoing sessions supervision in a web browser

one click launches an internal player without the need to install additional software

command line session material is fully interactive which enables copying content to the clipboard

Quick session blocking

in case of any unauthorized activities, WHEEL FUDO PSM enables pausing or the termination of a session along with revoking access rights

Remote co-working

co-sharing session enables the system administrator to join a given connection and work along the remote user

Uniform and independent environment

WHEEL FUDO PSM does not require the installation of additional software or agents, which enables rapid deployment and integration with existing IT infrastructures

Timestamping

Easy to use administration interface

Session sharing

WHEEL FUDO PSM enables sharing session with third parties in the form of a URL link

Detailed session information

WHEEL FUDO PSM stores all session’s data and metadata, which includes transferred files, keystrokes and cursor movement. The session player allows for skipping inactivity intervals, fast-forwarding as well as seeking to a specific time within the recorded content. Additionally, RDP and VNC sessions can be OCR processed. Recorded sessions can be exported to video format. Sessions can be commented and tagged while full-text search and advanced filtering options enable finding desired content quickly

Live session supervision and proactive monitoring

WHEEL FUDO PSM enables live session supervision by designated personnel as well as automated actions upon detecting unauthorized user actions specified as patterns

Directory services support

WHEEL FUDO PSM supports LDAP and Active Directory services which allowsa user’s definitions to be imported as well as verifying the user’s login credentials

Authentication mechanisms

Runtime login and password substitution

WHEEL FUDO PSM can, after successful authentication, substitute credentials provided by the user with credentials configured in Fudo or fetched from a third party Password Vault solution. With the substitution feature in use, the actual login credentials to target hosts do not have to be disclosed to end-users

Feel free to contact us by means of the form hereunder.

FEATURED DOWNLOAD -(GDPR READINESS ASSESSMENT)

1. DO YOU KNOW WHO, WHAT, WHERE AND WHEN CHANGES ARE BEING MADE TO YOUR CRITICAL IT SYSTEMS?
2. HOW DO YOU TRACK COPYING, ACCESS OR HOW DO YOU TRACK WHO HAS ACCESS TO WHICH FILES AND FOLDERS?
3. HOW DO YOU TRACK WHO HAS ACCESS TO WHICH FILES AND FOLDERS AND HOW IT WAS GRANTED?
4. HOW DO YOU PROTECT YOUR SELF FROM INSIDER THREATS AND RANSOMWARE?